IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Multimedia (View All Report Types)
1 - 25 of 177 Matches Previous Page  |  Next Page
Top 10 Security Changes in Red Hat Enterprise Linux 8
sponsored by Red Hat
WEBCAST: In this webinar, see an overview of the most notable enhancements to the many security capabilities in Red Hat Enterprise Linux 8 and how to use them to enhance the security posture of your systems.
Posted: 16 Aug 2019 | Premiered: Aug 16, 2019

Red Hat

Defend Yourself with Risk-Based Vulnerability Management
sponsored by Arctic Wolf Networks, Inc.
WEBCAST: In this webcast, security expert Ian Hassard, Director of Product Management at Arctic Wolf Networks, shares top strategies on how to protect your business against phishing and ransomware attacks with rapid detection, response and remediation.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Arctic Wolf Networks, Inc.

Security, Risk and Governance Breach Defense: Anatomy of a Breach
sponsored by Micro Focus
WEBCAST: The odds of experiencing a data breach are 1 in 4. And as seen from breaches including Equifax, Yahoo and Uber, the effects are costly. But how can organizations keep secure? There needs to be a plan. In this webcast, Rob MacDonald discusses how organizations can use the NIST Framework to strengthen their defenses against a breach.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Micro Focus

Machine Learning in Security
sponsored by Micro Focus
WEBCAST: In this webcast, Mario Daigle, VP of Product for Interset, a Micro Focus company, discusses 2 main categories of machine learning—supervised and unsupervised—and how they can be applied practically in the context of solving cybersecurity problems.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Micro Focus

Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
sponsored by Forcepoint
WEBCAST: Some approaches to information security simply won't deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy. In this webcast, Doug Landoll discusses how to take a risk-first approach to addressing information security.
Posted: 07 Aug 2019 | Premiered: Aug 7, 2019

Forcepoint

The State of the CASB Market
sponsored by Forcepoint
WEBCAST: In this webcast, CEO and Osterman Research founder Mike Osterman shares the results of his survey on how organizations are using, or planning to implement, CASB solutions. Tune into this webinar to learn more about the need for CASBs in today's organizations.
Posted: 07 Aug 2019 | Premiered: Aug 7, 2019

Forcepoint

Accelerate Cloud App Adoption without Compromising Security
sponsored by Forcepoint
WEBCAST: Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments – every cloud service has its own security framework, different APIs and different authentication mechanisms. In this webcast, learn how to gain full visibility into your cloud environment.
Posted: 07 Aug 2019 | Premiered: Aug 7, 2019

Forcepoint

Are You Taking a Risk-Adaptive Approach to Dynamic Data Protection?
sponsored by Forcepoint
WEBCAST: In this webcast, Bharath Vasudevan from Forcepoint discusses how taking a risk-adaptive approach combined with behavioral analytics can enable your security to fluctuate based on the threat environment. The webcast will also explore how Forcepoint's solution, Dynamic Data Protection, delivers risk-adaptive protection.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019

Forcepoint

Mastering Policy Setting and Control in the Cloud
sponsored by Forcepoint
WEBCAST: Join guest presenter Andras Cser, a Forrester Vice President and Principal Analyst, as he shares recommendations for securing data and mastering policy setting in the cloud.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019

Forcepoint

Dragos Industrial Cybersecurity Platform
sponsored by Dragos
VIDEO: The industrial security community faces strategic challenges in responding to cyberthreats. In this video, learn about Dragos' industrial cybersecurity platform which helps ICS defenders to identify assets, detect threats and respond via investigation playbooks.
Posted: 02 Aug 2019 | Premiered: 11 Nov 2018

Dragos

Holistic Privacy Readiness
sponsored by Okera
WEBCAST: In this Okera webcast, learn about the requirements for holistic privacy readiness and the best practices for S3 and azure data lakes.
Posted: 02 Aug 2019 | Premiered: Aug 2, 2019

Okera

Is Microsoft O365 Good Enough Protection & Recovery Webinar?
sponsored by Mimecast
WEBCAST: Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

Acalvio Deception Intro Video
sponsored by Acalvio
WEBCAST: In cyberdefense, deception is being used to detect malicious activity with very high fidelity, dramatically shrinking the dwell time from months to weeks. Despite its success, deploying deception has been a massive challenge. In this webcast, learn how ShadowPlex addresses these challenges head-on.
Posted: 27 Jun 2019 | Premiered: Jun 27, 2019

Acalvio

Acalvio ShadowPlex Presentation
sponsored by Acalvio
WEBCAST: Acalvio ShadowPlex provides advanced threat detection capabilities using enterprise deception at the core of its solution. Watch this live demo of Acalvio ShadowPlex to learn more about the platform and how to use it.
Posted: 24 Jun 2019 | Premiered: Apr 29, 2019

Acalvio

Webinar: CCPA Explained
sponsored by Okera
WEBCAST: As privacy regulations like CCPA and GDPR continue to proliferate, organizations need to become proactive and avoid a free-for-all approach that can leave them vulnerable to massive fines. In this webcast, Mark Donsky, Head of Product at Okera discusses CCPA and how to best protect your customers' sensitive information to avoid costly penalties.
Posted: 21 Jun 2019 | Premiered: Jun 21, 2019

Okera

Webcast: 5 Steps to Selecting an Enterprise Antivirus Replacement
sponsored by Ziften
WEBCAST: 38% of enterprises plan to replace their AV in the next 12 months, according to The State of Endpoint Security Risk, Ponemon Institute study. However, researching and finding an endpoint security solution can be overwhelming. In this webcast, explore 5 steps to help you select an enterprise antivirus replacement.
Posted: 17 Jun 2019 | Premiered: Jun 17, 2019

Ziften

How to Automate an API Security Program
sponsored by Data Theorem
WEBCAST: Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Data Theorem

Modernize Your Data Protection
sponsored by Forcepoint
WEBCAST: Navigating your data protection journey can be complex. In this webcast, Angelica Torres-Corral, Senior Product Marketing Manager at Forcepoint gives insights to gaining visibility & control of your data, optimizing a Data Loss Prevention (DLP) software and adopting a more proactive security strategy.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Forcepoint

Endpoint Protection Plus Webinar
sponsored by Ziften
WEBCAST: Endpoint protection can be complex and leave your organization vulnerable to attackers. This is because most endpoints aren't patched or users disable security tools. In this webcast, listen as Ziften's Roark Pollock and Logan Gilbert discuss 10 things to consider when looking at endpoint protection platforms.
Posted: 16 Apr 2019 | Premiered: Apr 16, 2019

Ziften

Automate Compliance Audits Without the Staff
sponsored by Data Theorem
WEBCAST: Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.
Posted: 09 Apr 2019 | Premiered: Feb 1, 2019

Data Theorem

Shipping Fast
sponsored by Trend Micro, Inc.
WEBCAST: In the security world, you don't normally hear people talking about moving fast. However, a modern and resilient security strategy is just as fast as the rest of your business. In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses the benefits of reducing the number of security tools your team uses.
Posted: 05 Apr 2019 | Premiered: Apr 5, 2019

Trend Micro, Inc.

Run Applications Anywhere
sponsored by Trend Micro, Inc.
WEBCAST: In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses how you can implement a simpler strategy for maintaining security while running your applications in any environment.
Posted: 04 Apr 2019 | Premiered: Apr 4, 2019

Trend Micro, Inc.

Building Secure Software
sponsored by Trend Micro, Inc.
WEBCAST: Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.
Posted: 03 Apr 2019 | Premiered: Apr 3, 2019

Trend Micro, Inc.

Regulation, Innovation and Financial Services
sponsored by Onfido
VIDEO: Thanks to a recent spate of data breaches, SSNs and other traditional identifiers are no longer fit for purpose. But without identity verification, new customers can't be on boarded. Tune into this webinar to learn why passive data proofing is no longer enough – and which authentication approaches to avoid.
Posted: 29 Mar 2019 | Premiered: 29 Mar 2019

Onfido

Cloud Security: Don't Go Blind While Playing in the Cloud
sponsored by Ziften
WEBCAST: Clouds are an intense security target because of their concentration of information. Why would hackers target multiple different companies when they can go to the cloud data center and see the same target opportunity? In this webcast, listen as Dr. Al Hartmann and Michael Levin discuss 6 security tips for moving enterprise apps to the cloud.
Posted: 27 Mar 2019 | Premiered: Mar 27, 2019

Ziften
1 - 25 of 177 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement